US9438617B2 - Application security testing - Google Patents
Application security testing Download PDFInfo
- Publication number
- US9438617B2 US9438617B2 US14/431,996 US201214431996A US9438617B2 US 9438617 B2 US9438617 B2 US 9438617B2 US 201214431996 A US201214431996 A US 201214431996A US 9438617 B2 US9438617 B2 US 9438617B2
- Authority
- US
- United States
- Prior art keywords
- vulnerability
- instructions
- function
- under test
- application under
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000012360 testing method Methods 0.000 title claims abstract description 133
- 239000003607 modifier Substances 0.000 claims abstract description 52
- 238000000034 method Methods 0.000 claims description 33
- 230000004044 response Effects 0.000 claims description 27
- 238000004891 communication Methods 0.000 claims description 25
- 230000008569 process Effects 0.000 claims description 17
- 230000035515 penetration Effects 0.000 claims description 8
- 230000000694 effects Effects 0.000 claims description 7
- 238000012986 modification Methods 0.000 abstract description 8
- 230000004048 modification Effects 0.000 abstract description 8
- 230000006870 function Effects 0.000 description 37
- 230000009471 action Effects 0.000 description 10
- 238000013459 approach Methods 0.000 description 8
- 238000010586 diagram Methods 0.000 description 8
- 238000004519 manufacturing process Methods 0.000 description 7
- 238000012545 processing Methods 0.000 description 5
- 239000013598 vector Substances 0.000 description 4
- 238000012546 transfer Methods 0.000 description 3
- 230000008901 benefit Effects 0.000 description 2
- 235000000332 black box Nutrition 0.000 description 2
- 238000012550 audit Methods 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 230000000903 blocking effect Effects 0.000 description 1
- 230000003139 buffering effect Effects 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 230000009193 crawling Effects 0.000 description 1
- 238000012217 deletion Methods 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000001902 propagating effect Effects 0.000 description 1
- 238000000275 quality assurance Methods 0.000 description 1
- 238000009877 rendering Methods 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 230000008685 targeting Effects 0.000 description 1
- 238000010200 validation analysis Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/3668—Software testing
- G06F11/3672—Test management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/566—Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Quality & Reliability (AREA)
- Virology (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Debugging And Monitoring (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims (19)
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/US2012/057691 WO2014051597A1 (en) | 2012-09-28 | 2012-09-28 | Application security testing |
Publications (2)
Publication Number | Publication Date |
---|---|
US20150264074A1 US20150264074A1 (en) | 2015-09-17 |
US9438617B2 true US9438617B2 (en) | 2016-09-06 |
Family
ID=50388788
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/431,996 Active US9438617B2 (en) | 2012-09-28 | 2012-09-28 | Application security testing |
Country Status (7)
Country | Link |
---|---|
US (1) | US9438617B2 (en) |
EP (1) | EP2901346A4 (en) |
JP (1) | JP2015535997A (en) |
KR (1) | KR20150063439A (en) |
CN (1) | CN104685477B (en) |
BR (1) | BR112015006653A2 (en) |
WO (1) | WO2014051597A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10318728B2 (en) * | 2014-12-16 | 2019-06-11 | Entit Software Llc | Determining permissible activity based on permissible activity rules |
Families Citing this family (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104303189B (en) | 2012-07-25 | 2018-07-20 | 安提特软件有限责任公司 | System and method for determining vulnerability of application program |
US10032659B2 (en) * | 2012-12-28 | 2018-07-24 | Sunedison Semiconductor Limited (Uen201334164H) | Methods and systems for preventing unsafe operations |
CN104134034B (en) * | 2013-06-13 | 2015-10-21 | 腾讯科技(深圳)有限公司 | Control the method and apparatus that application runs |
EP3170115A4 (en) * | 2014-07-18 | 2018-02-28 | EntIT Software LLC | Determining terms for security test |
WO2016048322A1 (en) * | 2014-09-25 | 2016-03-31 | Hewlett Packard Enterprise Development Lp | Determine secure activity of application under test |
US10516692B2 (en) * | 2014-09-29 | 2019-12-24 | Micro Focus Llc | Detection of email-related vulnerabilities |
US9619372B2 (en) * | 2015-02-10 | 2017-04-11 | Wipro Limited | Method and system for hybrid testing |
US9767291B2 (en) * | 2015-10-06 | 2017-09-19 | Netflix, Inc. | Systems and methods for security and risk assessment and testing of applications |
US10419401B2 (en) * | 2016-01-08 | 2019-09-17 | Capital One Services, Llc | Methods and systems for securing data in the public cloud |
US9473523B1 (en) | 2016-02-04 | 2016-10-18 | International Business Machines Corporation | Execution of test inputs with applications in computer security assessment |
US10999308B2 (en) * | 2017-01-30 | 2021-05-04 | Xm Cyber Ltd. | Setting-up penetration testing campaigns |
US10592677B2 (en) * | 2018-05-30 | 2020-03-17 | Paypal, Inc. | Systems and methods for patching vulnerabilities |
US11200154B2 (en) * | 2019-03-11 | 2021-12-14 | International Business Machines Corporation | Function modification for software application testing |
CN113722717B (en) * | 2021-07-21 | 2024-04-05 | 中国科学院信息工程研究所 | Security vulnerability testing method, device, equipment and readable storage medium |
Citations (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5983348A (en) | 1997-09-10 | 1999-11-09 | Trend Micro Incorporated | Computer network malicious code scanner |
JP2002328896A (en) | 2001-04-27 | 2002-11-15 | Nippon Telegr & Teleph Corp <Ntt> | Device for automatically setting rule coping with illegal access |
WO2002097620A2 (en) | 2001-05-31 | 2002-12-05 | Qualcomm Incorporated | Safe application distribution and execution in a wireless environment |
US20030056116A1 (en) * | 2001-05-18 | 2003-03-20 | Bunker Nelson Waldo | Reporter |
US20040123117A1 (en) * | 2002-12-18 | 2004-06-24 | Symantec Corporation | Validation for behavior-blocking system |
JP2005134995A (en) | 2003-10-28 | 2005-05-26 | Recruit Co Ltd | System, method and program for security management |
US20050273854A1 (en) * | 2004-06-04 | 2005-12-08 | Brian Chess | Apparatus and method for developing secure software |
JP2006018765A (en) | 2004-07-05 | 2006-01-19 | Infocom Corp | Temporary correcting method and program for software |
US20070107057A1 (en) * | 2005-11-10 | 2007-05-10 | Docomo Communications Laboratories Usa, Inc. | Method and apparatus for detecting and preventing unsafe behavior of javascript programs |
US7237265B2 (en) * | 2000-03-03 | 2007-06-26 | Watchfire Corporation | System for determining web application vulnerabilities |
US20070203973A1 (en) * | 2006-02-28 | 2007-08-30 | Microsoft Corporation | Fuzzing Requests And Responses Using A Proxy |
JP2007241906A (en) | 2006-03-11 | 2007-09-20 | Hitachi Software Eng Co Ltd | Web application vulnerability dynamic inspection method and system |
US20080162687A1 (en) * | 2006-12-28 | 2008-07-03 | David Alan Scott | Data acquisition system and method |
US20080263671A1 (en) | 2007-03-06 | 2008-10-23 | Core Sdi, Incorporated | System and Method for Providing Application Penetration Testing |
US20100064178A1 (en) | 2008-09-10 | 2010-03-11 | Microsoft Corporation | World-Readiness and Globalization Testing Assemblies |
US20110185231A1 (en) | 2010-01-27 | 2011-07-28 | Filippo Balestrieri | Software application testing |
JP2012027618A (en) | 2010-07-21 | 2012-02-09 | Nec Corp | Web vulnerability repair device, web server, web vulnerability repair method, and program |
US8141158B2 (en) | 2008-12-31 | 2012-03-20 | International Business Machines Corporation | Measuring coverage of application inputs for advanced web application security testing |
JP4927231B1 (en) | 2011-12-22 | 2012-05-09 | 株式会社フォティーンフォティ技術研究所 | Program, information device, and unauthorized access detection method |
US8185877B1 (en) | 2005-06-22 | 2012-05-22 | Jpmorgan Chase Bank, N.A. | System and method for testing applications |
US20130311835A1 (en) * | 2012-05-15 | 2013-11-21 | International Business Machines Corporation | Forecasting workload transaction response time |
US20140007222A1 (en) * | 2011-10-11 | 2014-01-02 | Zenprise, Inc. | Secure execution of enterprise applications on mobile devices |
US20140090054A1 (en) * | 2011-07-26 | 2014-03-27 | Securitymatters B.V. | System and Method for Detecting Anomalies in Electronic Documents |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7652749B2 (en) * | 2006-02-14 | 2010-01-26 | Asml Netherlands B.V. | Software upgrades in a lithographic apparatus |
US7814544B1 (en) * | 2006-06-22 | 2010-10-12 | Symantec Corporation | API-profile guided unpacking |
CN101901184B (en) * | 2009-05-31 | 2012-09-19 | 西门子(中国)有限公司 | Method, device and system for inspecting vulnerability of application program |
CN101571829B (en) * | 2009-06-19 | 2011-06-15 | 北京航空航天大学 | Automatic closed loop test method of real-time embedded software |
US20110219449A1 (en) * | 2010-03-04 | 2011-09-08 | St Neitzel Michael | Malware detection method, system and computer program product |
-
2012
- 2012-09-28 EP EP12885510.3A patent/EP2901346A4/en not_active Withdrawn
- 2012-09-28 KR KR1020157009868A patent/KR20150063439A/en not_active Application Discontinuation
- 2012-09-28 BR BR112015006653A patent/BR112015006653A2/en not_active IP Right Cessation
- 2012-09-28 JP JP2015534445A patent/JP2015535997A/en active Pending
- 2012-09-28 US US14/431,996 patent/US9438617B2/en active Active
- 2012-09-28 CN CN201280076151.4A patent/CN104685477B/en not_active Expired - Fee Related
- 2012-09-28 WO PCT/US2012/057691 patent/WO2014051597A1/en active Application Filing
Patent Citations (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5983348A (en) | 1997-09-10 | 1999-11-09 | Trend Micro Incorporated | Computer network malicious code scanner |
US7237265B2 (en) * | 2000-03-03 | 2007-06-26 | Watchfire Corporation | System for determining web application vulnerabilities |
JP2002328896A (en) | 2001-04-27 | 2002-11-15 | Nippon Telegr & Teleph Corp <Ntt> | Device for automatically setting rule coping with illegal access |
US20030056116A1 (en) * | 2001-05-18 | 2003-03-20 | Bunker Nelson Waldo | Reporter |
JP2005517220A (en) | 2001-05-31 | 2005-06-09 | クゥアルコム・インコーポレイテッド | Secure application distribution and execution in a wireless environment |
WO2002097620A2 (en) | 2001-05-31 | 2002-12-05 | Qualcomm Incorporated | Safe application distribution and execution in a wireless environment |
US20040123117A1 (en) * | 2002-12-18 | 2004-06-24 | Symantec Corporation | Validation for behavior-blocking system |
JP2005134995A (en) | 2003-10-28 | 2005-05-26 | Recruit Co Ltd | System, method and program for security management |
US20050273854A1 (en) * | 2004-06-04 | 2005-12-08 | Brian Chess | Apparatus and method for developing secure software |
JP2006018765A (en) | 2004-07-05 | 2006-01-19 | Infocom Corp | Temporary correcting method and program for software |
US8185877B1 (en) | 2005-06-22 | 2012-05-22 | Jpmorgan Chase Bank, N.A. | System and method for testing applications |
US20070107057A1 (en) * | 2005-11-10 | 2007-05-10 | Docomo Communications Laboratories Usa, Inc. | Method and apparatus for detecting and preventing unsafe behavior of javascript programs |
US20070203973A1 (en) * | 2006-02-28 | 2007-08-30 | Microsoft Corporation | Fuzzing Requests And Responses Using A Proxy |
JP2007241906A (en) | 2006-03-11 | 2007-09-20 | Hitachi Software Eng Co Ltd | Web application vulnerability dynamic inspection method and system |
US20080162687A1 (en) * | 2006-12-28 | 2008-07-03 | David Alan Scott | Data acquisition system and method |
US20080263671A1 (en) | 2007-03-06 | 2008-10-23 | Core Sdi, Incorporated | System and Method for Providing Application Penetration Testing |
US20100064178A1 (en) | 2008-09-10 | 2010-03-11 | Microsoft Corporation | World-Readiness and Globalization Testing Assemblies |
US8141158B2 (en) | 2008-12-31 | 2012-03-20 | International Business Machines Corporation | Measuring coverage of application inputs for advanced web application security testing |
US20110185231A1 (en) | 2010-01-27 | 2011-07-28 | Filippo Balestrieri | Software application testing |
JP2012027618A (en) | 2010-07-21 | 2012-02-09 | Nec Corp | Web vulnerability repair device, web server, web vulnerability repair method, and program |
US20140090054A1 (en) * | 2011-07-26 | 2014-03-27 | Securitymatters B.V. | System and Method for Detecting Anomalies in Electronic Documents |
US20140007222A1 (en) * | 2011-10-11 | 2014-01-02 | Zenprise, Inc. | Secure execution of enterprise applications on mobile devices |
JP4927231B1 (en) | 2011-12-22 | 2012-05-09 | 株式会社フォティーンフォティ技術研究所 | Program, information device, and unauthorized access detection method |
US20130311835A1 (en) * | 2012-05-15 | 2013-11-21 | International Business Machines Corporation | Forecasting workload transaction response time |
Non-Patent Citations (3)
Title |
---|
IBM, "Through the Looking-Glass," Application Security Insider, (Web Page), Nov. 16, 2011, 4 pages, available at http://blog.watchfire.com/wfblog/2011/11/through-the-looking-glass.html. |
International Search Report & Written Opinion received in PCT Application No. PCT/US2012/057691, Apr. 26, 2013, 9 pages. |
MacDonald, N., "Interactive Application Security Testing," (Web Page), Jan. 30, 2012, 4 pages, available at http://blogs.gartner.com/neil-macdonald/2012/01/30/interactive-application-security-testing/. |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10318728B2 (en) * | 2014-12-16 | 2019-06-11 | Entit Software Llc | Determining permissible activity based on permissible activity rules |
Also Published As
Publication number | Publication date |
---|---|
JP2015535997A (en) | 2015-12-17 |
CN104685477B (en) | 2018-01-19 |
KR20150063439A (en) | 2015-06-09 |
US20150264074A1 (en) | 2015-09-17 |
EP2901346A4 (en) | 2016-06-08 |
WO2014051597A1 (en) | 2014-04-03 |
EP2901346A1 (en) | 2015-08-05 |
CN104685477A (en) | 2015-06-03 |
BR112015006653A2 (en) | 2017-07-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9438617B2 (en) | Application security testing | |
EP2891100B1 (en) | Security scan based on dynamic taint | |
US10380008B2 (en) | Identifying implicit assumptions associated with a software product | |
US10210335B2 (en) | Application security testing | |
TWI575397B (en) | Point-wise protection of application using runtime agent and dynamic security analysis | |
US20170316202A1 (en) | Rasp for scripting languages | |
US9846781B2 (en) | Unused parameters of application under test | |
US20180075233A1 (en) | Systems and methods for agent-based detection of hacking attempts | |
US9507933B2 (en) | Program execution apparatus and program analysis apparatus | |
EP2715600A1 (en) | Automated security testing | |
US9953169B2 (en) | Modify execution of application under test so user is power user | |
Pieczul et al. | Runtime detection of zero-day vulnerability exploits in contemporary software systems | |
Rasthofer et al. | Harvesting runtime data in android applications for identifying malware and enhancing code analysis | |
Su et al. | Detection of android malware by static analysis on permissions and sensitive functions | |
Pan et al. | Domxssmicro: A micro benchmark for evaluating dom-based cross-site scripting detection | |
Aloraini et al. | Evaluating state-of-the-art free and open source static analysis tools against buffer errors in android apps | |
CN111159714A (en) | Method and system for verifying credibility of main body in operation in access control | |
CN115292707A (en) | Credibility judgment method and device based on dynamic class calling sequence | |
Spottka | Evaluating Dynamic AnalysisMethods for Android Applications | |
Alavi | Application of Software Analysis in Detecting Vulnerabilities: Testing and Security Assessment | |
Juhola | Security testing process for React Native applications | |
CN115292708A (en) | Execution permission analysis method and device based on bytecode | |
Weissbacher | Hardening Web Applications against CSV Attacks | |
Williams et al. | Interactive vulnerability analysis enhancement results | |
Nandula | A Survey paper on Security Testing |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P., TEXAS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:MENDELEV, KIRILL;MADOU, MATIAS;NG, MING SUM SAM;SIGNING DATES FROM 20120926 TO 20151026;REEL/FRAME:036919/0488 |
|
AS | Assignment |
Owner name: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP, TEXAS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.;REEL/FRAME:037079/0001 Effective date: 20151027 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
AS | Assignment |
Owner name: ENTIT SOFTWARE LLC, CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP;REEL/FRAME:042746/0130 Effective date: 20170405 |
|
AS | Assignment |
Owner name: JPMORGAN CHASE BANK, N.A., DELAWARE Free format text: SECURITY INTEREST;ASSIGNORS:ATTACHMATE CORPORATION;BORLAND SOFTWARE CORPORATION;NETIQ CORPORATION;AND OTHERS;REEL/FRAME:044183/0718 Effective date: 20170901 Owner name: JPMORGAN CHASE BANK, N.A., DELAWARE Free format text: SECURITY INTEREST;ASSIGNORS:ENTIT SOFTWARE LLC;ARCSIGHT, LLC;REEL/FRAME:044183/0577 Effective date: 20170901 |
|
AS | Assignment |
Owner name: MICRO FOCUS LLC, CALIFORNIA Free format text: CHANGE OF NAME;ASSIGNOR:ENTIT SOFTWARE LLC;REEL/FRAME:050004/0001 Effective date: 20190523 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 4 |
|
AS | Assignment |
Owner name: MICRO FOCUS LLC (F/K/A ENTIT SOFTWARE LLC), CALIFORNIA Free format text: RELEASE OF SECURITY INTEREST REEL/FRAME 044183/0577;ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:063560/0001 Effective date: 20230131 Owner name: NETIQ CORPORATION, WASHINGTON Free format text: RELEASE OF SECURITY INTEREST REEL/FRAME 044183/0718;ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:062746/0399 Effective date: 20230131 Owner name: MICRO FOCUS SOFTWARE INC. (F/K/A NOVELL, INC.), WASHINGTON Free format text: RELEASE OF SECURITY INTEREST REEL/FRAME 044183/0718;ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:062746/0399 Effective date: 20230131 Owner name: ATTACHMATE CORPORATION, WASHINGTON Free format text: RELEASE OF SECURITY INTEREST REEL/FRAME 044183/0718;ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:062746/0399 Effective date: 20230131 Owner name: SERENA SOFTWARE, INC, CALIFORNIA Free format text: RELEASE OF SECURITY INTEREST REEL/FRAME 044183/0718;ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:062746/0399 Effective date: 20230131 Owner name: MICRO FOCUS (US), INC., MARYLAND Free format text: RELEASE OF SECURITY INTEREST REEL/FRAME 044183/0718;ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:062746/0399 Effective date: 20230131 Owner name: BORLAND SOFTWARE CORPORATION, MARYLAND Free format text: RELEASE OF SECURITY INTEREST REEL/FRAME 044183/0718;ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:062746/0399 Effective date: 20230131 Owner name: MICRO FOCUS LLC (F/K/A ENTIT SOFTWARE LLC), CALIFORNIA Free format text: RELEASE OF SECURITY INTEREST REEL/FRAME 044183/0718;ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:062746/0399 Effective date: 20230131 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 8 |